Preserving Digital Information


Book Description

Cultural history enthusiasts have asserted the urgent need to protect digital information from imminent loss. This book describes methodology for long-term preservation of all kinds of digital documents. It justifies this methodology using 20th century theory of knowledge communication, and outlines the requirements and architecture for the software needed. The author emphasizes attention to the perspectives and the needs of end users.




The 2030 Spike


Book Description

The clock is relentlessly ticking! Our world teeters on a knife-edge between a peaceful and prosperous future for all, and a dark winter of death and destruction that threatens to smother the light of civilization. Within 30 years, in the 2030 decade, six powerful 'drivers' will converge with unprecedented force in a statistical spike that could tear humanity apart and plunge the world into a new Dark Age. Depleted fuel supplies, massive population growth, poverty, global climate change, famine, growing water shortages and international lawlessness are on a crash course with potentially catastrophic consequences. In the face of both doomsaying and denial over the state of our world, Colin Mason cuts through the rhetoric and reams of conflicting data to muster the evidence to illustrate a broad picture of the world as it is, and our possible futures. Ultimately his message is clear; we must act decisively, collectively and immediately to alter the trajectory of humanity away from catastrophe. Offering over 100 priorities for immediate action, The 2030 Spike serves as a guidebook for humanity through the treacherous minefields and wastelands ahead to a bright, peaceful and prosperous future in which all humans have the opportunity to thrive and build a better civilization. This book is powerful and essential reading for all people concerned with the future of humanity and planet earth.




Computer Networks


Book Description




Computer Networks


Book Description

This edition reflects the latest networking technologies with a special emphasis on wireless networking, including 802.11, 802.16, Bluetooth, and 3G cellular, paired with fixed-network coverage of ADSL, Internet over cable, gigabit Ethernet, MPLS, and peer-to-peer networks. It incorporates new coverage on 3G mobile phone networks, Fiber to the Home, RFID, delay-tolerant networks, and 802.11 security, in addition to expanded material on Internet routing, multicasting, congestion control, quality of service, real-time transport, and content distribution.




Operation Just Cause


Book Description




Pentagon 9/11


Book Description

The most comprehensive account to date of the 9/11 attack on the Pentagon and aftermath, this volume includes unprecedented details on the impact on the Pentagon building and personnel and the scope of the rescue, recovery, and caregiving effort. It features 32 pages of photographs and more than a dozen diagrams and illustrations not previously available.







U.S. Marines in Battle


Book Description

This is a study of the Second Battle of Fallujah, also known as Operation Al-Fajr and Operation Phantom Fury. Over the course of November and December 2004, the I Marine Expeditionary Force conducted a grueling campaign to clear the city of Fallujah of insurgents and end its use as a base for the anticoalition insurgency in western Iraq. The battle involved units from the Marine Corps, Army, and Iraqi military and constituted one of the largest engagements of the Iraq War. The study is based on interviews conducted by Marine Corps History Division field historians of battle participants and archival material. The book will be of primary interest to Marines, other service members, policy makers, and the faculty and students at the service schools and academies. Historians, veterans, high school through univeristy history departments and students as well as libraries may be interested in this book as well. With full color maps and photographs.